Zentera’s CoIP® (Cyber over IP) platform implements Cyber Overlay through a suite of tools, including powerful micro-segmentation and identity-based access controls, enabling the quick and easy protection of company assets using the NIST SP800-207 Zero Trust architecture. It governs all the pillars of the CISA Zero Trust Maturity Model, helping customers achieve zero-trust security with minimal effort.
The Zentera CoIP Zero Trust architecture management platform is innovative and patented, used to protect a wide range of critical asset classes in typical enterprise environments, including layered applications, OT devices, and even entire data centers. The CoIP platform can be deployed on top of existing applications and infrastructure without modifying existing network equipment, allowing critical applications to be upgraded and strengthened through robust, zero-trust-based access controls. It works in on-premises, cloud, OT, and hybrid environments, authorizing access in a zero-trust mode while pre-defining threats and data breaches based on zero trust.
Scenario 1: Secure Access
The CoIP platform supports the universal ZTNA zero-trust access method, so users will have a consistent experience and the same level of security whether they are in the office or working remotely.
- Any TCP, UDP, or web application
- accessible via Windows, Mac, Linux, and mobile devices
- allows simultaneous access to local and cloud assets
Scenario 2: Remote Desktop Application
No VPN is required; connections are directly bridged to the servers running CoIP zLink.
- This machine supports VNC/RDP; integrates with third-party remote desktop solutions (VDI, RDP).
- Copy/paste controls allow you to configure appropriate security levels.
- No open network ports are required (reducing the attack surface).
Scenario 3: Secure Shell Access
The CoIP platform’s Secure Shell feature supports remote SSH access to any server.
- Mutual authentication prevents SSH from being vulnerable to man-in-the-middle attacks.
- CoIP authentication applies MFA to SSH
- Without requiring an open network port.
Scenario 4: Secure File Transfer
The CoIP platform allows you to securely transfer files directly between machines with the zLink agent installed.
- Users upload and download from remote machines; server-to-server synchronization and mirroring.
- Audit traces associate all file transfers with user identities.
- Optional DLP and antivirus scans with administrative approval workflows.